CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
88e94fd1f0ec7327941c6a4712ced26212a0f80657945f4820553579846917da.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
88e94fd1f0ec7327941c6a4712ced26212a0f80657945f4820553579846917da.dll
Resource
win10v2004-20230831-en
General
-
Target
88e94fd1f0ec7327941c6a4712ced26212a0f80657945f4820553579846917da
-
Size
933KB
-
MD5
6647feb37159ffdbb005faf711c8feae
-
SHA1
dc2442a214070a0c49eff299b03399ad86c5cc0f
-
SHA256
88e94fd1f0ec7327941c6a4712ced26212a0f80657945f4820553579846917da
-
SHA512
d9fe492ee4499e20ee6d762d7152ea090848912560ceee55ef8ce9710a82a168720d6f1b91397a523a5f6fadc984adf27515fed8a2e37119b998b4cf778f38e2
-
SSDEEP
24576:JU84bevUA7XnZvTCaQgJRBaLjPq2ioxQmEcXbiPm0XXYPYgnrWKzlYmIQI1LGLLi:CvbevUA7XnZvTCaQgJRBaLjPq2ioxQm+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88e94fd1f0ec7327941c6a4712ced26212a0f80657945f4820553579846917da
Files
-
88e94fd1f0ec7327941c6a4712ced26212a0f80657945f4820553579846917da.dll windows x86
61ed3eb9f6af462f03ed002f0c453bc4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
DbgPrint
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
GetTokenInformation
LookupAccountSidW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
comctl32
CreatePropertySheetPageW
ord413
DestroyPropertySheetPage
InitCommonControlsEx
PropertySheetW
ord412
ord410
comdlg32
GetOpenFileNameW
kernel32
CloseHandle
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentVariableW
GetLastError
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
GetVolumeInformationW
GlobalAlloc
GlobalFree
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
MoveFileExW
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WritePrivateProfileStringW
lstrcpyW
lstrcpynW
lstrlenW
msimg32
AlphaBlend
msvcrt
__dllonexit
_amsg_exit
_initterm
_iob
_lock
_onexit
_stricmp
_strupr
_unlock
_vsnwprintf
_wcsicmp
_wcsnicmp
_wcsupr
_wtoi
abort
calloc
free
fwrite
memmove
strncmp
strstr
swprintf
towlower
vfprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
wcsrchr
wcsstr
wcstok
wcstoul
ole32
CoTaskMemFree
powrprof
CallNtPowerInformation
setupapi
IsUserAdmin
SetupCloseInfFile
SetupFindFirstLineW
SetupFindNextLine
SetupGetIntField
SetupGetStringFieldW
SetupOpenInfFileW
shell32
SHAddFromPropSheetExtArray
SHBrowseForFolderW
SHCreatePropSheetExtArray
SHDestroyPropSheetExtArray
SHGetPathFromIDListW
ShellExecuteExW
ShellExecuteW
shlwapi
PathFileExistsW
PathIsDirectoryW
StrFormatByteSizeW
gdi32
BitBlt
CreateBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
DeleteDC
DeleteObject
GetObjectW
GetPixel
SelectObject
SetBkMode
SetTextColor
user32
BeginDeferWindowPos
BeginPaint
CheckDlgButton
DeferWindowPos
DestroyIcon
DialogBoxParamW
DrawTextW
EnableWindow
EndDeferWindowPos
EndDialog
EndPaint
FillRect
GetClientRect
GetDC
GetDlgItem
GetDlgItemInt
GetDlgItemTextW
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InvalidateRect
IsDlgButtonChecked
KillTimer
LoadIconW
LoadImageW
LoadStringW
MapDialogRect
MapWindowPoints
MessageBoxW
OffsetRect
PostMessageW
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetDlgItemInt
SetDlgItemTextA
SetDlgItemTextW
SetRect
SetTimer
SetWindowLongW
SetWindowTextW
ShowScrollBar
ShowWindow
SystemParametersInfoW
wsprintfW
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rossym Size: 96KB - Virtual size: 95KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ